Joint Intelligence Support System (JISS)

Joint Intelligence Support System (JISS)

Introduction

Joint Intelligence Support System (JISS) is the primary intelligence information system operated by the Defence Intelligence Oranisation. It is accessed by a number of Defence and security agencies, and is also accessible to ADF intelligence cells deployed abroad. However it is also employed in domestic operations, including counter-terrorism.  It is part of the wider development of an ADF Network Centric Warfare capacity. The existence of the JISS became public following allegations by Lieutenant-Colonel Lance Collins, the former intelligence officer of the National Command Element in East Timor, that on December 20, 1999, access by his office to the JISS was intentionally turned off by DIO officers for several days, seriously damaging ADF operations under InterFET on the border with Indonesian West Timor.

Government sources

Knowledge System Equipment Acquisition Projects in Defence, Audit Report No.11 2000–2001 Department of Defence, Australian National Audit Office, 2000

“3.18 Command support systems provide data, such as logistics, readiness, operational and environmental data, for use in situational awareness, planning, decision-making and capability enhancement.

“3.19 In the past, the ADF’s command support systems, such as Army’s ongoing $165 million Battlefield Command Support System (BCSS – formerly known as AUSTACCS) and Air Force’s Air Command Support Systems (ACSS), were developed primarily for a single Service. Defence formed HQAST in 1995 and some projects took on a joint-Service form and title. Examples are the Joint Command Support System (JCSS), which now incorporates the ACSS as an integral phase and component, and the Joint Intelligence Support System (JISS).”

 2004 Defence Capability Plan, Department of Defence

“Project: Joint Intelligence Support System (JISS) [DEF 7013]
Description: High priority databases, data acquisition, fusion and transformation including upgraded IT infrastructure, networks and applications. Cost estimate: $50 million
Decisions: FY 2008/9, 2010/11
Roll out: 2010/12″

2007 Network Centric Warfare Roadmap,

JISS is part of the Future Defence Intelligence Concept, which “provides some high-level guidance on the integration of ideas and capabilities needed to form an effective sensor grid.”

Analysis

Soldier claims Australians exposed in Timor, Tom Allard, Sydney Morning Herald, 25 July 2005

“A vital intelligence database shut down during the East Timor conflict was restored only on the condition army intelligence officers ceased reporting on Indonesian-backed militia activities in West Timor, Lieutenant-Colonel Lance Collins has revealed.”a prototype and was AUSTEO, or Australian Eyes Only. Until then, all intelligence reporting had been on a shared network that could be accessed by key Australian allies, including the US. ‘It meant Canberra could control what was reported.’ he [Collins] said.”

C2 Interoperability – An Australian National Whole of Government Approach, Neil Warner, 9th International Command and Control Research and Technology Symposium on Coalition Transformation: An Evolution of People, Processes and Technology to Enhance Interoperability [PDF, 146.3 KB]

As shown in the discussion with respect to the Mercury 04 Exercises, the following agencies could be involved in counter terrorism exercises or operations. Their information systems are also briefly discussed.

  • Protective Security Coordination Centre (Attorney-Generals Department (AGs), use an internal AG Information System and would have access to ASNET;
  • Australia Federal Police – use the PROMIS System, previously discussed, and would have access to ASNET;
  • Emergency Management Australia – Consequent Management, use an internal AGs Information System;
  • State Police Forces include Tactical Response Groups and Crisis Management Centres. Use an internal Information Systems that differ from state to state;
  • Department of Defence, especially Headquarters Special Forces, Defence Intelligence Organisation, the Special Air Service Regiment, 4th Battalion the Royal Australian Regiment (Commando), Tactical Assault Groups (West) and (East), 1st Commando Regiment and the Incident Response Regiment under the Defence Legislation Amendment (Aid to Civilian Authorities) Act 2000. DOD uses a combination of Joint Intelligence Support System (JISS), JCSS and SOCSS and would have access to ASNET.
  • Australian Security Intelligence Organisation for Intelligence
  • Many other Commonwealth and State agencies for Consequence Management

Transforming the Australian Defence Force (ADF) for Information Superiority, Gary Waters and Desmond Ball, Canberra Paper 159, Strategic and Defence Studies Centre, ANU, 2005

Australia and cyber-warfare, Gary Waters, Desmond Ball and Ian Dudgeon, Canberra Papers on Strategy and Defence, no. 168, 2008

Joint Deployable Intelligence Support System [JDISS], Intelligence Systems, GlobalSecurity.org

The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission. JDISS and the Joint Worldwide Intelligence Communications System (JWICS) together comprise the joint standard and foundation for commonality among intelligence support systems. JDISS provides joint intelligence centers, joint task forces (JTFs), and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community’s resources. JDISS is also the technical baseline for DODIIS client-server environment (CSE).

See also

Updated: 5 March 2009